What principles should the information security analyst

Assignment Help Computer Engineering
Reference no: EM131721086

Prompt. Use the information on each of these topics to develop a customized training manual for newly hired cybersecurity professionals at CyberLeet.

Specifically, the following critical elementsmust be addressed:

When doing the assignment is take in consideration the 3 core of information security: confidentiality, integrity and availability

I. How to Develop Cybersecurity Policies: In this part of the training manual, you will develop the cybersecurity policies in four distinct areas for new hires at CyberLeet. Based on information you have learned on cybersecurity use and governance, you will develop policies for end-user passwords, acceptable use, basic users, and user training. For each of these areas, follow the guiding questions to develop effective use policies that new hires will be trained on.

A. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you address confidentiality, integrity, and availability of information.

• Password length and composition of the password (e.g., uppercase, numbers, special characters)
• Time period between resets and ability to reuse a prior password
• Differentiated policies for different types of users (e.g., administrator vs. regular user)

B. What principles should the information security analyst apply in order to develop appropriate acceptable use policiesfor the client?
• What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable?
• What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition?
• When and why should users be aware of acceptable use policies and how can organizations keep track of these policies?

C. What principles should the information security analyst apply in order to develop appropriate user training policiesfor the client?
• How to determine who would be trained
• How to determine how often trainings would occur
• How to determine whether certain staff receive additional training or whether they should be held to higher standards

D. What principles should the information security analyst apply in order to develop appropriate basic user policiesfor the client?
• When and why should users have to display some type of identification while in the workplace?
• What types of physical access (with or without ID) to company areas is acceptable? Why?
• When and why should employees with identification be allowed access to all areas of the company?
• When and why should employees be allowed to take work home or bring guests into the workplace?

Reference no: EM131721086

Questions Cloud

Discuss problem about an iphone app : Cindy Combs, a professional investor, was having lunch with a colleague recently and said, "Do you remember Peter Kennedy the entrepreneur we met the other day.
Identify any control problems in the system : Development and adoption of the accounting software packages - Describes and prepare a system flowchart of the sales procedures for the chosen organisation
Vertical integration and outsourcing for businesses : What are the advantages and disadvantages of vertical integration and outsourcing for businesses?
Ethics and law-basic concepts : The document "Ethics and Law: Basic Concepts, Cases & Dilemmas" outlines 5 different approaches to ethical decision making:
What principles should the information security analyst : What principles should the information security analyst apply in order to develop appropriate basic user policiesfor the client
Define reason to take money from an investor : Jose Peacher is an executive with large manufacturing company. A former coworker of his recently started a company and raised $1 million from a well-known.
1977 clean water act and the 1987 water quality act : What are the key differences between the 1977 Clean Water Act and the 1987 Water Quality Act?
Assessment and a third-party assessment : Review the differences between an operational assessment and a third-party assessment.
Create web application to be used to train sales employees : You have been hired to work with 8 employees from different branches of national business to help create web application to be used to train sales employees.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design and implement a simulation of the game of volleyball

Design and implement a simulation of the game of volleyball. Normal volleyball is played like racquetball, in that a team can only score points when it is serving.

  Write a program which takes two digits

Write a program which takes 2 digits, X,Y as input and generates a 2-dimensional array. The element value in the i-th row and j-th column of the array should be i * j

  What do you mean by sensitivity analysis how would you use

what is a sensitivity analysis? how would you use it in planning for future expansions? what role does this kind of

  Determine what particular piece of hardware

Specifically solution provides the learner an understanding of what steps to take to troubleshoot hardware issues. While directed specifically towards troubleshoot the workstation connectivity problem, the solution is applicable to troubleshooting..

  Provide function voidclearscreen that will clear the window

I have supplied a header file called assn.hto be utilized with this assignment: it provides the function voidclearScreen()that will clear the terminal window, to be invoked at specified spots within the algorithm.

  How many register windows must be saved to memory

How many register windows must be saved to memory.

  Develop a simple service recording and management system

CPT121 / COSC2135 Programming - developing a simple service recording and management system for MovieMaster, which is a mechanical servicing business which offers rental movies for hire.

  Consider architecture a that has the addressing

Consider architecture A that has the addressing modes below for the ADD instruction. Based on the ADD instruction, is this architecture better be encoded as a fixed-length instruction or a variablelength

  Demonstrate ascii code conversion

Develop a program for the PIC 16F84A using the MPLAB v8 IDE (MPLAB IDE v8.86) simulator software - Demonstrate the use of subroutines, e.g. initialize the peripheral registers and to set the time delays, etc.

  Definition of method dashedline

Write down the definition of the method dashedLine , with one parameter, an int. If parameter is negative or zero, method does nothing.

  Why is it stated that electronic commerce is a catalyst of

why is it said that electronic commerce is a catalyst of fundamental changes in organizations? search the ashford

  What do you mean by an entity

How is it possible to get more information from the equal amount of data though using a database approach as opposed to a file approach.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd